ppap13b.ppt

19
An Approach to Formalise Security Patterns Luis Sergio da Silva Junior, ´ Ecole Polytechnique de Montr´ eal March, 2013 Sergio An Approach to Formalise Security Patterns 1/ 19

Upload: ptidej-team

Post on 18-Dec-2014

66 views

Category:

Technology


0 download

DESCRIPTION

Security, patterns, detection

TRANSCRIPT

Page 1: Ppap13b.ppt

An Approach to Formalise Security Patterns

Luis Sergio da Silva Junior,Ecole Polytechnique de Montreal

March, 2013

Sergio An Approach to Formalise Security Patterns 1/ 19

Page 2: Ppap13b.ppt

Context

Software Development

• Methods, Techniques and Tools

• Reuse

• Design Patterns

• Security Patterns

Sergio An Approach to Formalise Security Patterns 2/ 19

Page 3: Ppap13b.ppt

Security Patterns

Properties

• Group of patterns focused on security context

• Threat, Attack, Attacker, Asset etc

• UML diagrams

• Originally, not formally specified

Sergio An Approach to Formalise Security Patterns 3/ 19

Page 4: Ppap13b.ppt

Security Patterns

Example 1

• Single Access Point

• Guard Door

Sergio An Approach to Formalise Security Patterns 4/ 19

Page 5: Ppap13b.ppt

Security Patterns

Sergio An Approach to Formalise Security Patterns 5/ 19

Page 6: Ppap13b.ppt

Security Patterns

Example 2

• Roles

• Group of roles

• Restrict Access

Sergio An Approach to Formalise Security Patterns 6/ 19

Page 7: Ppap13b.ppt

Formal Methods

Definition

Formal Methods (FM) consist of a set of techniques and tools basedon mathematical modeling and formal logic that are used to spec-ify and verify requirements and designs for computer systems andsoftware

OCL and extensions

Petri Nets

ASM

others

Sergio An Approach to Formalise Security Patterns 7/ 19

Page 8: Ppap13b.ppt

Formalizing Security Patterns

Correct implementation of restrictions and properties

Avoid Threats and bad implementation

Security Improvement

Sergio An Approach to Formalise Security Patterns 8/ 19

Page 9: Ppap13b.ppt

Petri Nets

Places, Tokens and Arcs

Different Types (Coloured, Temporized )

CPN-Tools

Why Petri Nets ?

Sergio An Approach to Formalise Security Patterns 9/ 19

Page 10: Ppap13b.ppt

Study Case

Sender-Receiver example

Microarchitecture example

constraint - the size of the message cannot be longerthan 10

Structural analysis - PADL and Reflection structure

Behavioural analysis - Comparison between the pattern andthe Petri Net structure

Sergio An Approach to Formalise Security Patterns 10/ 19

Page 11: Ppap13b.ppt

Structural analysis

Pattern detection through structural analysis

Class diagrams

Send its result to the next step

Sergio An Approach to Formalise Security Patterns 11/ 19

Page 12: Ppap13b.ppt

Structural analysis

Sergio An Approach to Formalise Security Patterns 12/ 19

Page 13: Ppap13b.ppt

Structural analysis

Create a Pattern Model using PADL

Comparison with Real objects - using Java Reflection API

Compare all attributes, associations

Display accuracy.

Sergio An Approach to Formalise Security Patterns 13/ 19

Page 14: Ppap13b.ppt

Behavioural analysis

Sergio An Approach to Formalise Security Patterns 14/ 19

Page 15: Ppap13b.ppt

Behavioural Analysis

Create Coloured Petri Net Model by CPN-ToolsUsing XML extractor from the .cpn fileUsing Classes, Interfaces to keep the information on JavastructureExtract method internal structure from .java fileCompare expressions and attributions from the java sourcecode with the Petri net arc inscription.Display accuracy

Sergio An Approach to Formalise Security Patterns 15/ 19

Page 16: Ppap13b.ppt

Behavioural analysis

Expressions and Attributions

Sergio An Approach to Formalise Security Patterns 16/ 19

Page 17: Ppap13b.ppt

Future Work

Testing with a Real System

Single Access Point, Roles, Session

Evaluate Version with Simulation of Petri Net model

More Formal Methods

Provide running analysis.

Sergio An Approach to Formalise Security Patterns 17/ 19

Page 18: Ppap13b.ppt

Future Work

Find the pattern in some complex structure

Petri Net restriction - named places and transitions

Different calls, same idea (length and size)

Sergio An Approach to Formalise Security Patterns 18/ 19

Page 19: Ppap13b.ppt

Acknowledgment

Sergio An Approach to Formalise Security Patterns 19/ 19